Selective Storing of Mining Models for Enabling Interactive Data Mining - A new data mining model (DMM) is created having at least one of the following characteristics: quality and complexity. The new DMM is handled as a candidate for storing in a storage device if a predefined criterion for the characteristics is met. The sum of the sizes of the new DMM and already stored DMMs is determined. In response to the sum falling below a storage limit, the new DMM is stored in the storage device. In response to the sum exceeding the storage limit, a decision is taken based on priorities of the DMMs which DMMs to store in the storage device.

2013-01-17

20130018918

Repetitive Query Recognition and ProcessingAANM Peek; Daniel NotaAACI SunnyvaleAAST CAAACO USAAGP Peek; Daniel Nota Sunnyvale CA US - Processing repetitive database queries may include receiving a database query having a connection identifier, determining whether a queue for database queries contains an earlier database query matching the received database query, identifying the second database query as matching the first database query if the queue contains an earlier matching database query, receiving query results for the earlier matching database query from a database server, and forwarding query results to the clients associated with both database queries using corresponding connection identifiers.

2013-01-17

20130018919

Speculative Switch DatabaseAANM Peek; Daniel NotaAACI SunnyvaleAAST CAAACO USAAGP Peek; Daniel Nota Sunnyvale CA US - Processing switch database operations may include receiving a database selection message from a database client, transmitting an unconditional acknowledgement to the database client in response to the database selection message, accessing a database query from a queue of queries from the a database client where the database query includes a user identifier and a database identifier, determining whether a matching backend database connection exists, and if a matching backend database connection exists, forwarding the database query to the matching backend database connection. In some embodiments, a matching backend database connection may be a backend database connection having a user identifier equivalent to the user identifier of the database query, and a database identifier that is equivalent to the database identifier the database query.

2013-01-17

20130018920

CONFIGURATION MANAGEMENT DATABASE SECURITYAANM Griffin; Andrew M.AACI Fort CollinsAAST COAACO USAAGP Griffin; Andrew M. Fort Collins CO US - Methods, systems, and computer-readable media with executable instructions stored thereon for Configuration Management Database security are provided. Resource data and user security policy data can be loaded from a number of different sources into the CMDB. The resource data and user security policy data can be tagged with an identity of a source of the resource data and an identity of a source of the user security policy data. A number of data filters can be added to the CMDB and at least one of the data filters can be used to filter a user query of the resource data.

2013-01-17

20130018921

NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISKAANM JIN; HongxiaAACI San JoseAAST CAAACO USAAGP JIN; Hongxia San Jose CA USAANM WANG; QihuaAACI San JoseAAST CAAACO USAAGP WANG; Qihua San Jose CA US - Embodiments of the invention related to access control to sensitive data records, and in particular need-to-know information access using quantified risk. In one aspect of the invention access control includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. A warning is issued if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold.

INDEXING MESSAGING EVENTS FOR SEEKING THROUGH DATA STREAMS - Techniques disclosed herein include systems and methods for indexing data events from a stream of data for seeking through recorded data streams. Techniques disclosed herein can enable a faster and more efficient process by which a processor can seek from one point of time in a data stream to another point of time in that data stream to bring a played-back application to a desired point in time. A playback manager analyzes data events within a series of data events, which are recorded in a linear data structure. The playback manager creates a hierarchical data structure for storing the data events to provide logically grouped storage of data events in addition to the linear data structure. The playback manager stores the data events in the hierarchical data structure based on type of data event and based on timestamps associated with each respective data event. The playback manager then traverses the linear data structure and consolidates data events to produce a hierarchical state representation of the recorded data stream at the given seek point for rendering in a playback application.

2013-01-17

20130018926

Generating Report of Identifiers and Time ValuesAANM Schmidt; OlafAACI WalldorfAACO DEAAGP Schmidt; Olaf Walldorf DEAANM Fischer; Martin P.AACI HeidelbergAACO DEAAGP Fischer; Martin P. Heidelberg DE - Among other disclosure, a computer-implemented method for business process reporting includes receiving, at a server device, a first identifier of a business document, the business document being an instance of a business document type and having a first timestamp. The method includes polling multiple systems with the first identifier using the server device, the polling requesting (i) second identifiers for related objects of the business document according to a relationship model that is local to the system being polled, and (ii) metadata associated with the second identifiers, including second timestamps associated with the related objects; performing polling of at least some of the multiple systems with the second identifiers and any subsequently received identifiers using the server device, until the polling has been performed for all received identifiers. The method includes generating a report regarding the business document, the report including at least the received identifiers and all received timestamps.

2013-01-17

20130018927

USER-DRIVEN MENU GENERATION SYSTEM WITH DYNAMIC GENERATION OF TARGET FILES WITH PLACEHOLDERS FOR PERSISTENT CHANGE OR TEMPORARY SECURITY CHANGE OVER CLOUD COMPUTING VIRTUAL STORAGE FROM TEMPLATE FILES - Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields configured to be changed persistently, and a third changeable field. The second changeable field is configured to receive a security-related value. A third changeable field includes a first value configured to be changed temporarily to receive an encrypted version of the first value. The template file is parsed to generate a user interface, including: a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data. An encrypted version of the first value corresponding to the third changeable field is generated. The first value is temporarily replaced with the encrypted value. The target file is then generated.

2013-01-17

20130018928

PEER-TO-PEER REDUNDANT FILE SERVER SYSTEM AND METHODS - Peer-to-peer redundant file server system and methods include clients that determine a target storage provider to contact for a particular storage transaction based on a pathname provided by the filesystem and a predetermined scheme such as a hash function applied to a portion of the pathname. Servers use the same scheme to determine where to store relevant file information so that the clients can locate the file information. The target storage provider may store the file itself and/or may store metadata that identifies one or more other storage providers where the file is stored. A file may be replicated in multiple storage providers, and the metadata may include a list of storage providers from which the clients can select (e.g., randomly) in order to access the file.

2013-01-17

20130018929

Distributed Storage Method and System - Methods and systems are disclosed for distributed storage systems. For example, a device can receive a read request for a first file, where the read request is generated by a host device. The read request is configured to access a file on the host device. The device can access mappings to identify a first mapping. The device can identify a first file on a mobile device based on the first mapping. The device can access the first file, where the accessing uses the first mapping. The device can access the first file by communicating with the mobile device to read the first file. The device can then return the first file.

2013-01-17

20130018930

PEER-TO-PEER REDUNDANT FILE SERVER SYSTEM AND METHODS - Peer-to-peer redundant file server system and methods include clients that determine a target storage provider to contact for a particular storage transaction based on a pathname provided by the filesystem and a predetermined scheme such as a hash function applied to a portion of the pathname. Servers use the same scheme to determine where to store relevant file information so that the clients can locate the file information. The target storage provider may store the file itself and/or may store metadata that identifies one or more other storage providers where the file is stored. A file may be replicated in multiple storage providers, and the metadata may include a list of storage providers from which the clients can select (e.g., randomly) in order to access the file.

2013-01-17

20130018931

ACCESSING SNAPSHOTS OF A TIME BASED FILE SYSTEM - A file system driver stored in a computational device receives a request to provide access to a snapshot of a rewritable file system at a selected point in time, wherein a plurality of tokens corresponding to a plurality of data units are stored in the rewritable file system, and wherein an ordering relationship is maintained among the plurality of tokens. The file system driver determines a token corresponding to the selected point in time based on the ordering relationship. A virtual subdirectory name is generated corresponding to the determined token. A virtual subdirectory is created with the generated virtual subdirectory name, wherein the virtual subdirectory is a subdirectory of a root directory. The snapshot is accessed via the subdirectory.

2013-01-17

20130018932

SYSTEM AND METHOD FOR LONG RANGE AND SHORT RANGE DATA COMPRESSIONAANM Bhaskar; UdayaAACI North PatomacAAST MDAACO USAAGP Bhaskar; Udaya North Patomac MD USAANM Su; Chi-JiunAACI RockvilleAAST MDAACO USAAGP Su; Chi-Jiun Rockville MD US - A system and method are provided for use with streaming blocks of data, each of the streaming blocks of data including a number bits of data. The system includes a first compressor and a second compressor. The first compressor can receive and store a number n blocks of the streaming blocks of data, can receive and store a block of data to be compressed of the streaming blocks of data, can compress consecutive bits within the block of data to be compressed based on the n blocks of the streaming blocks of data, can output a match descriptor and a literal segment. The match descriptor is based on the compressed consecutive bits. The literal segment is based on a remainder of the number of bits of the data to be compressed not including the consecutive bits. The second compressor can compress the literal segment and can output a compressed data block including the match descriptor and a compressed string of data based on the compressed literal segment.

INTERACTING WITH TIME-BASED CONTENT - Systems and methods are provided for facilitating user and time-based content interaction. Sampling data received from a user device is compared to time-based content. The comparison is carried out, optionally without relying on watermark matching, to determine whether a match exists between the sampling data and the time-based content. Information relating to the sampling data may be transmitted to the user if the identification engine determines that the match exists.

NATIVE VIEWER USE FOR SERVICE RESULTS FROM A REMOTE DESKTOP - In one embodiment, a method includes establishing a session to a remote desktop determined for a user of a client device. The session allows the client device to remotely access the remote desktop to have one or more services performed for the user of the client device using resources of the remote desktop. The client device sends a request for a service in the one or more services to be performed on the remote desktop in the session and receives a result set determined from the service being performed by the remote desktop. A native viewer for the client device is determined based on a type of the result set. The native viewer is then invoked to display the result set.

2013-01-17

20130018940

INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUMAANM Ookuma; SatoshiAACI Yokohama-shiAACO JPAAGP Ookuma; Satoshi Yokohama-shi JP - This invention provides a technique of switching the display screen from a standby screen to a function selection screen in a short period of time in an information processing apparatus which displays screens on a display unit based on the screen data obtained from a server apparatus. To achieve this, an information processing apparatus (MFP) of the invention obtains screen data of a function selection screen (initial screen) from a server apparatus (Web server) while displaying, on a display unit, a standby screen based on screen data obtained from the Web server in a standby state. The MFP switches the display of the display unit from the standby screen to the function selection screen based on the obtained screen data upon receiving a close instruction for the standby screen during the display of the standby screen.

2013-01-17

20130018941

TECHNIQUES FOR PRESENTING EDUCATIONAL MATERIAL ONLINE - Embodiments of the invention provide techniques for verifying that an attendee of an online educational presentation views material that is presented. In some embodiments, a server computer may instruct an attendee's client computer to present verification information to the attendee which the attendee is to acknowledge. The verification information may, for example, comprise one or more codes, and may be presented at a point in time which is difficult for an attendee to predict. An indication whether the attendee acknowledged the verification information during the time it was presented may be stored, allowing the organizer of an online presentation to determine whether each attendee paid attention to the content presented.

2013-01-17

20130018942

SYSTEM AND METHOD FOR BANDWIDTH OPTIMIZATION IN A NETWORK STORAGE ENVIRONMENT - According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e.g., for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e.g., according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server.

2013-01-17

20130018943

DATA SHARING IN A DISTRIBUTED DATA STREAM PROCESSING SYSTEM - State sharing is facilitated in stream processing environments, including distributed stream processing environments. A customized shared state implementation representing the state to be shared is automatically created based on at least one of user preferences, hints of usage, and system performance.

2013-01-17

20130018944

METHODS AND SYSTEMS FOR PROVIDING CONTENT PROVIDER-SPECIFIED URL KEYWORD NAVIGATION - An apparatus and a non-transitory computer-readable medium may perform a method for providing brand-driven URL keyword navigation. The method may comprise: receiving a user selection of an accepted third party; transmitting third party selection information to the accepted third party, the third party selection information being based on the user selection; and receiving brand-driven keyword data from the accepted third party in response to the transmission of the third party selection information, the brand-driven keyword data mapping a keyword to a particular URL.

2013-01-17

20130018945

USER INTERFACE FOR ACCESSING MESSAGES - Described herein are systems and methods for providing a message UI engine for accessing messages on a message system. The message system may comprise a message storage system (that store messages of varying types and formats, such as fax, text, voice/audio, video, and picture messages) and a message access system. The message UI engine is configured by a Flash media UI file for accessing messages and associated message information by interacting with the message access system. The Flash media UI file does not comprise any markup language and comprises only Flash® instructions. The Flash media UI file also comprises a plurality of embedded applications for presenting the plurality of different message types, each embedded application comprising only Flash instructions. The associated message information may be stored and transmitted in a non-markup language format, such as comma-delimited format. The messages and message information may be transmitted using a non-HTTP protocol.

DYNAMIC NEWS MEDIA SELECTION FOR SOCIAL NETWORK DISTRIBUTIONAANM Pradeep; AnanthaAACI PiedmontAAST CAAACO USAAGP Pradeep; Anantha Piedmont CA US - Attributes associated with an entity such as a brand, product, or service are identified from analysis of the entity itself as well as from information from an entity owner such as a company or firm. Attributes and news articles are transmitted over a network. News articles exhibiting characteristics promoting identified attributes are selected and conveyed back over the network. The news articles are then posted on social network walls and profiles of pages of interested individuals. Entities may identify interested individuals as those who have joined, followed, liked, or subscribed to a particular entity page. Interested individuals may also be identified through their profile characteristic information.

METHOD AND SYSTEM FOR PLANNING A MEETING IN A CLOUD COMPUTING ENVIRONMENT - A method for planning a meeting in a cloud computing environment is disclosed. The method embodiment includes receiving by a server a meeting configuration file including information identifying a meeting, a plurality of meeting collaborators, and/or a plurality of meeting participants. When the meeting configuration file is received, the server is configured to generate a virtual planning space associated with the meeting and located in a cloud computing environment, to transmit a message to the plurality of meeting collaborators that includes an invitation to collaborate in the meeting via the virtual planning space, and to receive an indication to load planning content that includes at least one data object. In response to receiving the indication, the server associates the planning content with the virtual planning space so that the planning content is accessible by the meeting collaborators via the virtual planning space in the cloud computing environment.

2013-01-17

20130018953

METHOD AND SYSTEM FOR PRESENTING A MEETING IN A CLOUD COMPUTING ENVIRONMENT - A method for presenting a meeting in a cloud computing environment is disclosed. The method embodiment includes providing by a server a virtual planning space in a cloud computing environment, wherein the virtual planning space is associated with a meeting and is associated with planning content comprising data objects loaded by a plurality of meeting collaborators. The method also includes receiving by the server an indication to launch the meeting, and in response, generating a virtual meeting room associated with the meeting and an identifier for the virtual meeting room. Thereafter, the server is configured to transmit a message to a plurality of meeting participants that includes an invitation to attend the meeting and the identifier for the virtual meeting room, and to present meeting content comprising at least one data object of the planning content to the meeting participants via the virtual meeting room.

2013-01-17

20130018954

SITUATION-AWARE USER SENTIMENT SOCIAL INTEREST MODELS - A method for constructing user models from user usage and context data is provided where a personal interest graph for a user is constructing from interests of the user derived from usage data and situational data derived from one or more sensors of the electronic device. The nodes in the interest graph also contain information about a degree of user interest in the corresponding interest and a sentiment of the user at the time when the usage data suggests that the user expressed interest in the interest graph. The personal interest graph can be modified by annotating one or more nodes of the personal interest graph with influence information. Later, a current sentiment for the user can be determined by analyzing input from one more sensors on the electronic device, and a particular node can be located in the personal interest graph based on the information in the nodes.

2013-01-17

20130018955

COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR IMPLEMENTING A SOCIAL NETWORK INFORMATION FEED AS A PLATFORM - Disclosed are systems, apparatus, and methods for presenting feed items in an information feed. In various implementations, at least one feed parameter is determined, where the at least one feed parameter identifies a characteristic of at least one feed item to be included in the information feed. In some implementations, at least one feed search strategy is determined based on the determined at least one feed parameter, where the at least one feed search strategy identifies a feed query to be issued to a database system storing the feed items. In various implementations, the at least one feed item is identified based on the determined at least one feed parameter and the at least one feed search strategy. In various implementations, a first result object is generated, where the first result object includes the identified at least one feed item.

2013-01-17

20130018956

METHODS AND SYSTEMS FOR MANAGING MULTIPLE TIMELINES OF NETWORK FEEDS - Systems and methods are provided for managing multiple timelines of network feeds. A system accesses network feeds associated with at least one social network. The system identifies a first set of network feeds based on an associated first name, first keyword, first calendar date, and/or first geographic location. The system identifies a second set of network feeds based on an associated second name, second keyword, second calendar date, and/or second geographic location. The system outputs, to a display device, a first chronological representation of the first set of network feeds based on calendar dates associated with the first set of network feeds and a second chronological representation of the second set of network feeds based on calendar dates associated with the second set of network feeds. The system can supplement the chronological representations of network feeds with additional network feeds associated with other network users.

2013-01-17

20130018957

System and Method for Facilitating Management of Structured Sentiment Content - The present invention provides a structured sentiment expression and management system and method. The present invention can receive sentiment content from at least two contributing users, wherein the received content is structured according to a specific human emotion, gesture or feeling and a level of intensity of the specific human emotion, gesture or feeling. The present invention further displays the received content in a pre-defined and user-selected sentiment category related to the specific human emotion, gesture or feeling.

2013-01-17

20130018958

METHODS AND SYSTEMS FOR PUBLIC COLLABORATIVE INTERFACE FOR PRIVATE NETWORK GROUPS - Systems and methods are provided for a public collaborative interface for private computer networks. A system receives a domain name that enables users associated with the domain name to subscribe to a private network group, wherein the domain name differs from a domain name for the private network group. The system outputs a network feed from a user of the private network group to a display device associated with a user associated with the domain name in response to a determination that the user associated with the domain name is subscribed to the private network group. The system outputs a network feed from the user associated with the domain name to display devices associated with users of the private network group in response to a determination that the user associated with the domain name is subscribed to the private network group. The received domain name can be an email address.

2013-01-17

20130018959

SYSTEMS AND METHODS FOR THE ANALYSIS AND DISSEMINATION OF DATA WITHIN A NETWORKED COMMUNITY - A computer-implemented method for analyzing and disseminating data within a networked community is described. It is determined whether to gather data from a variety of data sources. Members of the networked community may also contribute data. The data is gathered and provided to an administrator of the networked community. Upon being analyzed, the data is disseminated to the members of the networked community.

2013-01-17

20130018960

Group Interaction around Common Online Content - An on-line system that allows a group of people to interact around common content, in which the system includes: a computer network; a server system coupled to the computer network; and multiple user devices, each of which is coupled to the computer network and each of which is associated with a respective member of the group, in which the server system stores identification information for each member of the group, and in which, in response to receiving a lead to content initiated by a member of the group, the server system is configured to send a reference to the content to the respective user devices of the other members of the group. In response to receiving the reference to the content, at least some of the user devices automatically access and load the content via the network.

2013-01-17

20130018961

METHOD AND SYSTEM FOR COLLECTING INFORMATION ABOUT A USER'S MEDIA COLLECTIONS FROM MULTIPLE LOGIN POINTS - Collecting information about a user's media collections at a central location from multiple login points and/or multiple devices owned by the user is disclosed herein. The user establishes a user account at a central server. A client application may be downloaded to the user's device for establishing a connection to the central server. Subsequently, each time the user logs in to the central server, the central server receives a unique machine identifier for the connected and currently in-use user device. The central server receives information about the user's media collection from the user device and stores that media collection by its MID under the user's individual account. The central server obtains and stores information about all the user's media collections owned by user devices connected and in-use and previously connected to the central server rather than only having knowledge of the media collection stored on the currently in-use user device.

2013-01-17

20130018962

CLIENT APPARATUS, SERVER APPARATUS, DOCUMENT MANAGEMENT SYSTEM, DOCUMENT MANAGEMENT METHOD, AND MEDIUM STORING PROGRAM THEREOF - A client generates a list associating a document, an operation for the document, and a user and transmits the list to a server. When an operation for the document is received from a user, the client acquires information including a document, an operation for the document, and a user and transmits the information to the server. The server receives and stores the list from the client, receives the information from the client, searches storage unit for a list including information matching the information, and transmits the list to the client. The client receives and displays the searched list.

MISSED INSTANT MESSAGE NOTIFICATION - A method and system for capturing missed communications is provided. An enhanced real-time communication system receives a communication from an initiating participant for a receiving participant that is not available. The enhanced real-time communication system detects that the receiving participant missed the received communication from the initiating participant. Upon detecting that the receiving participant missed the communication, the enhanced real-time communication system stores the missed communication for later retrieval by the receiving participant.

2013-01-17

20130018970

System and Method for Providing an Application to a Device - The disclosed embodiments include a system and method for providing at least one electronic application to at least one device. In one embodiment, the method includes acquiring device information that relates to the device and determining whether the device supports the at least one application based on the device information. The method may further include generating an electronic message for the device wherein the message contains at least one link for acquiring the at least one application when the device supports the application.

2013-01-17

20130018971

Message Screening System - A message screening system includes routing to a supervisory recipient an electronic message directed to an intended recipient. The supervisory recipient then is allowed to screen the electronic message by approving or rejecting the electronic message. The electronic message then is forwarded to the intended recipient if the electronic message is approved by the supervisory recipient.

2013-01-17

20130018972

SYSTEMS AND METHODS FOR CREATING AND UPDATING REPUTATION RECORDS - According to one aspect of the present disclosure, a computer-implemented method is provided for generating a reputation record and filtering electronic messages, each reputation record including a reputation score and a reputation key. The method includes receiving at least one incoming event notification, including a reputation key; determining, based on the reputation key, whether a corresponding reputation record exists; creating a new reputation record if the corresponding reputation record does not exist; determining a trust determination function based on the incoming event notification; calculating a reputation score based on the determined trust determination function, the incoming event notification, and an attribute associated with the reputation key; storing the calculated reputation score along with the reputation key in either the new reputation record or the corresponding reputation record; and filtering one or more electronic messages based on the calculated reputation score.

2013-01-17

20130018973

SYSTEMS AND METHODS TO IMPLEMENT AN EXCHANGE MESSAGING POLICY - Systems for and methods of evaluating messaging, comprising, receiving, via at least one server device, one or more messages, and said at least one server device processing at least one of the one or more messages by grading content included in said at least one message, applying a weighting factor to said at least one message according to said grading, thereby determining a weighted message count for said at least one message, aggregating the weighted message count for said at least one message, and initiating an action if the aggregated weighted message count meets or exceeds a predetermined count threshold.

2013-01-17

20130018974

COMMUNICATION TERMINAL APPARATUS, EMAIL CREATING METHOD AND RECORDING MEDIUMAANM Itani; HiroshiAACI Osaka-shiAACO JPAAGP Itani; Hiroshi Osaka-shi JPAANM Sumida; YoshiakiAACI Osaka-shiAACO JPAAGP Sumida; Yoshiaki Osaka-shi JP - This invention is directed to provision of a communication terminal apparatus that allows a reply email to be created by a simple operation without interrupting a current email creating process in a case where the remaining battery charge has been reduced during the email creating process. The communication terminal apparatus comprising: a communicating portion for sending/receiving a mail; a displaying portion; a storage portion that a preliminarily created power reducing message registered; a character string editing portion for displaying characters input by an input portion and conversion candidates of the characters on the displaying portion; a predictive conversion controlling portion for acquiring conversion candidates corresponding to characters input to the character string editing portion; and a remaining battery charge determining portion for determining a state of a remaining battery charge, wherein the predictive conversion controlling portion acquires and adds the power reducing message from the storage portion to conversion candidates if the remaining battery charge determining portion determines that a remaining battery charge level is equal to or less than a first prescribed value.

2013-01-17

20130018975

LOW FREQUENCY METHOD OF PAIRING A MASTER DEVICE TO MULTIPLE SLAVE DEVICESAANM Higgins; Robert J.AACI PlantationAAST FLAACO USAAGP Higgins; Robert J. Plantation FL US - Method and apparatuses for pairing more than one slave device with a master device through an exchange of low frequency messages between the slave devices and the master device are disclosed. A first secure data connection is established between a first slave device and the master device typically upon successfully completing a low frequency exchange of pairing credentials associated with establishment of the first secure data connection. The first slave device maintains an active, low frequency transceiver for receiving low frequency transaction requests from other slave devices. Upon receipt of a low frequency transaction request from a second slave device, the first slave device forwards low frequency transmissions between the second slave device and the master device to facilitate in exchanging pairing credentials associated with establishment of a second secure data connection.

2013-01-17

20130018976

CACHING EMAIL UNIQUE IDENTIFIERS - Accessing, via an end user device, email messages of an external mail source. A direct access proxy is operative to reconcile the email contents of external email sources with the email contents of user devices through the use of lists of unique email identifiers (UIDs). A Partition Database returns UID lists reflective of the UIDs of email messages previously received from the external email source and forwarded to a network server of the system (forwarded UID lists). A memory cache external to the direct access proxy and its corresponding Partition Database returns forwarded UID lists. The direct access proxy determines the data reliability of the Partition Database and memory cache, and obtains forwarded UID lists from the memory cache when it determines that the memory cache is at least as reliable as the Partition Database.

2013-01-17

20130018977

DATA SHARING METHODS AND PORTABLE TERMINALSAANM Peng; GangAACI BeijingAACO CNAAGP Peng; Gang Beijing CN - A data sharing method and a portable terminal are provided. The portable terminal is a first terminal having a first system and a second system which have a capability of operating a shared storage area. The method comprises: starting transmitting a file in the shared storage area to a second terminal by the first system; acquiring uploaded information of the file by the second system, when detecting that the first system fulfills a predetermined condition, during the transmission of the file in the shared storage area to the second terminal by the first system; and continuing the transmission of the file to the second terminal by the second system in accordance with the uploaded information. In the transmission of shared date according to the embodiments of the present disclosure, due to the two-system hybrid architecture of the terminal, one of the two systems may continue the transmission of the shared data if the transmission is interrupt by shut down or fault of the other one of the two systems, thereby the user experience in transmitting the shared data may be improved.

2013-01-17

20130018978

CONTENT DELIVERY NETWORK WITH DEEP CACHING INFRASTRUCTURE - Embodiments herein include methods and systems for use in delivering resources to a client device over a local network. An exemplary system comprises a plurality of caching devices operable to cache resources on behalf of a plurality of content providers, and a local caching device communicatively situated between an access network and the client device, wherein the access network is communicably situated between the plurality of caching devices and the local caching device. The local caching device is operable to retrieve a requested resource from at least one of the plurality of caching devices, deliver the requested resource to the client device over the local network, and store the requested resource for future requests by other client devices.

Communication System and Communication Device - A communication system includes a communication device and a communication network configured to communicate with the communication device. The communication network includes a storage unit configured to store first communication information related to a communication to the communication device that is generated when communications with the communication device are unattainable; and a notifying unit configured to send the first communication information stored in the storage unit to the communication device when communications with the communication device become attainable. The communication device is configured to receive the first communication information sent from the notifying unit, and includes a restraining unit configured to restrain function of a local device based on the first communication information.

METHOD AND SYSTEM FOR PROVIDING RECOMMENDED INFORMATION FROM A CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM - A method for presenting to a user recommended information from a customer relationship management (CRM) system is disclosed. The method embodiment includes receiving by a user system associated with a user an indication to request recommended CRM records managed by the CRM system, and in response, collecting real-time user specific information stored on the user system. A message including a request for recommended CRM records and at least a portion of the real-time user specific information is transmitted from the user system to a CRM server configured to identify at least one recommended CRM record from a plurality of CRM records related to the user-specific information. When a response message from the CRM server and including information identifying the recommended CRM record(s) is received by the user system, at least a portion of the information is displayed on a user interface of the user system.

2013-01-17

20130018983

Method and System for Controlled Distribution of Information Over a Network - An information management and distribution system is disclosed. The information management and distribution system includes a client-side application and a server application that interact to facilitate the controlled exchange of contact information over a network. The client-side application can provide creation and design, rolodex, exchange, and update features. The information management and distribution system can also include a corporate administrator application. Still another aspect of the invention is that contact information can be distributed to registered users in a common format.

2013-01-17

20130018984

INFORMATION CARD FEDERATION POINT TRACKING AND MANAGEMENT - A client can store information about federation points. A federation point is a combination of an identifier of an account on a relying party and an identifier of an information card. The client can track which information cards are included n various federation points, and can use this information to assist the user in performing a transaction with relying parties.

2013-01-17

20130018985

Methods and Apparatus for Remote Data Transfer - Methods and apparatus for communication and data transfer according to various aspects of the present invention include a communication system configured to transfer data to and from a mobile customer device. The communication system may receive customer data for a customer, such as a communication carrier for and a type of remote device. The communication system may include a storage system to store communication information associated with a plurality of wireless carriers and/or device types, such as the wireless carrier and the remote device identified for the user. The communication system may further include a host configured to access the storage system and communicate with the remote device according to the communication information associated with the wireless carrier and/or the remote device.

Speculative Begin TransactionAANM Peek; Daniel NotaAACI SunnyvaleAAST CAAACO USAAGP Peek; Daniel Nota Sunnyvale CA US - Speculative processing of begin transaction database messages may include receiving a begin transaction message from a database client, transmitting an acknowledgement of the begin transaction message to the database client prior to forwarding the begin transaction message to the database server, forwarding the begin transaction message to the database server, and receiving an acknowledgement of the begin transaction message from the database server. In some implementations, the acknowledgement of the begin transaction message to the database client is transmitted substantially without delay after receiving the begin transaction message from the database client.

2013-01-17

20130018989

Speculative Database AuthenticationAANM Peek; Daniel NotaAACI SunnyvaleAAST CAAACO USAAGP Peek; Daniel Nota Sunnyvale CA US - Speculative processing of authentication messages may include transmitting a first series of simultaneous messages to a database client, the first series of simultaneous messages including a handshake message and a first authentication acknowledgement message, receiving a second series of simultaneous messages from the database client, the second series of simultaneous messages including an authentication message and a database message, and transmitting a database acknowledgment message to the database client. In some implementations, the second series of simultaneous messages is received from the database client substantially without delay after the transmission of the first series of simultaneous messages.

Method And System For Caching Real-Time Data - A system and method for storing data representing a multidimensional entity using corresponding dimensions for the data, storing a further dimension for the data, the further dimension being a modification timestamp indicating a time when the data was modified, receiving a request for the data representing the multi-dimensional entity, the request including a request timestamp indicating a further time when a previous request for the data representing the multi-dimensional entity was received and transmitting the data only when the modification timestamp is later than the request timestamp.

FLEXIBLE GRAPHICAL EXTENSION ENGINE - A flexible graphical extension engine having a function block engine combined with extensions in communications with a wall module bus to make it possible to provide fixed function, configurable function and programmable function devices which implement additional function block behavior, and provide an automated configuration approach for generating configuration files for a programmable wall module. In other words, the engine not only depends on fixed inputs and outputs (I/O's) and fixed features in a control solution, but also may allow for flexible blocks and the ability to change an interface on the fly (i.e., during operation).

2013-01-17

20130018997

Distribution of Content Document to Varying Users with Security, Customization and Scalability - A system and method for receiving a request for a container document, determining whether the request is for a container document associated with a user group, determining whether a requestor of the request is associated with a level of status within the user group among a plurality of levels of status within the user group, determining the level of status of the requestor based on a determination that the requestor is associated with a level of status within the user group, requesting configuration information based on a determination that the container document is associated with a user group and the level of status, receiving the configuration information, and serving the container document using the configuration information.

2013-01-17

20130018998

MANAGING APPLICATION INTERACTIONS USING DISTRIBUTED MODALITY COMPONENTS - A method for managing multimodal interactions can include the step of registering a multitude of modality components with a modality component server, wherein each modality component handles an interface modality for an application. The modality component can be connected to a device. A user interaction can be conveyed from the device to the modality component for processing. Results from the user interaction can be placed on a shared memory are of the modality component server.

SYSTEM AND METHODS OF RESOURCE USAGE USING AN INTEROPERABLE MANAGEMENT FRAMEWORK - Generic rights expression language allowing interoperability across different computing environments including resource usage of different applications. A formal framework for usage management provides scaffolding upon which interoperable usage management systems can be built. Certain features of the framework are standardized, such as the operational semantics, including areas free of standards that necessitate choice and innovation to achieve a balance of flexibility and usability for interoperability in usage management systems.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DERIVING USER AVAILABILITY FROM USER CONTEXT AND USER RESPONSES TO COMMUNICATIONS REQUESTSAANM Sylvain; DanyAACI QuebecAACO CAAAGP Sylvain; Dany Quebec CA - Disclosed herein are methods, systems, and computer readable media for deriving user availability from user context and user responses to communications requests. According to an aspect, a method includes monitoring communications requests. Each of the communications requests may include a request for conducting a communication session between a requesting user and a requested user. The method may also include monitoring user responses to the communications requests. Further, the method may include determining user contexts for the requested user corresponding to each of the communications requests communicated to the requested user. The method may include determining an indication of user availability for the requested user based on the user responses and the corresponding user contexts. The method may also include providing the indication of user availability to one or more authorized users.

FUNNEL ANALYSIS OF THE ADOPTION OF AN APPLICATIONAANM MUKUNTHU; DEEPAKAACI HyderabadAACO INAAGP MUKUNTHU; DEEPAK Hyderabad IN - A funnel approach is used to analyze the behavior of users in adopting a software application offered through an electronic store. The electronic store may include an electronic store client module that provides a virtual electronic store front to users interested in licensing software applications offered by the electronic store. The electronic store may utilize a server that stores the applications store as well as collect instrumentation data representing user's actions in progressing through the various stages of adoption.

2013-01-17

20130019008

METHOD AND SYSTEM FOR MONITORING PERFORMANCE OF AN APPLICATION SYSTEMAANM Jorgenson; LokiAACI VancouverAACO CAAAGP Jorgenson; Loki Vancouver CAAANM Pang; Alfred Yu-HanAACI VancouverAACO CAAAGP Pang; Alfred Yu-Han Vancouver CA - A method for monitoring performance of an application system which is distributed across a plurality of network connected nodes, comprising: generating a hierarchical model for the application system, the hierarchical model having a plurality of levels, each level including components of a span specific to that level; mapping the application system onto the hierarchical model according to a network topology of the application system; monitoring network traffic between the plurality of network connected nodes of the application system to gather network traffic data; assembling the network traffic data into application messages; correlating the application messages into sets of one or more application messages that are causally associated in accordance with the hierarchical model, wherein the sets of causally associated application messages constitute transactions corresponding to a lowest level of the hierarchical model; and, generating records of individual transactions occurring within the application system for at least the transactions corresponding to the lowest level of the hierarchical model.

2013-01-17

20130019009

METHOD AND SYSTEM FOR SUBSCRIBER JOURNEY ANALYTICS - The present method and system relate to analyzing journeys of at least one subscriber consuming a plurality of Internet services, using at least one device over multiple access technologies. The method and system store in a database, for each subscriber, a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The method and system collect, by means of multiple monitoring probes, real time data from IP traffic; and extract information from the collected real time data, the information comprising one of the unique identifiers. The information is transmitted to an analytic system, where it is aggregated per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. For each subscriber, a journey is generated, by processing the aggregated information with the analytic system.

2013-01-17

20130019010

Web-beacon plug-Ins and their certification - Tools and techniques are provided to allow partners of analytics providers and others who use web-beacons to submit web-beacon plug-ins for scrutiny, and for the plug-in to either be refused or else to be certified for use in a core JavaScript file or similar component. Analytics providers and others may also write web-beacon plug-ins. Certified plug-ins are executed in response to page loads, visitor clicks, and other visitor and programmatic actions at a website that has been tagged by the analytics provider's web-beacon, without requiring re-tagging of the website with a separate web-beacon for the partner. This allows the partner to obtain analytics data by piggybacking on the analytics provider, without re-tagging, and without compromising the availability and accuracy of the analytics data already being gathered. To be certified, web-beacon plug-ins must satisfy specific criteria as to their size, behavior, namespace, and the like.

2013-01-17

20130019011

POLICY-DRIVEN CAPACITY MANAGEMENT IN RESOURCE PROVISIONING ENVIRONMENTS - Systems and methods for policy-driven capacity management in a resource provisioning environment, the method comprising storing, in an operational database one or more virtual resource sets (VRSs) and elasticity ranges for components to be deployed in a resource provisioning environment, and probabilistic guarantees on the elasticity ranges defined in a service manifest provided by a service subscriber; collecting historical data about capacity usage in the resource provisioning environment and failure statistics from the operational database, in addition to prior service commitments due to previously contracted service level agreements (SLAs) stored in a SLA repository; calculating equivalent capacity for the resource provisioning environment based on a defined residual benefit goal, and other business goals instrumented by way of a policy engine; and placing requested virtual resources on physical resources, in response to determining that sufficient physical capacity is available to host the calculated equivalent capacity.

SYSTEM AND METHOD FOR SUPPORTING VIRTUAL MACHINE MIGRATION IN A MIDDLEWARE MACHINE ENVIRONMENT - A system and method can support virtual machine migration in a middleware machine environment. The middleware machine environment can comprise one or more network switch instances with one or more external ports, each of which is adapted to receive data packets from an external network. Furthermore, the middleware machine environment can comprise a plurality of virtual interfaces on one or more host servers. Each said host server is associated with one or more virtual machines that can process the one or more data packets. A virtual machine on a first host server is allowed to migrate from the first host server to a second host server and operates to receive one or more packets via a virtual interface on the second host server and process the one or more data packets.